Looking for a reverse engineer to help me learn how to exploit simple buffer overflows. I have a sample application that is ran locally on my machine. It runs on Linux 32bit (x86), it is a netcat listener, and the code is VERY simple.
My IDA analyzes it as such, - [url removed, login to view]
The goal is to exploit the buffer overlow, caused by "setbufv" and "scanf", and get a shell. The application ran locally! So it is 100% legit, this is an exercise for me to learn.
I understand assembly well, but I do not have much debugging experience on "linux", so I would like to pay someone who will be able to teach me to exploit this vulnerability, Hopefully involving showing me how you used "GDB", or "radare2", or whatever debugger you use, via Teamviewer or write up.
This should be quick for someone who has experience doing this sorta thing. If you are capable or into this type of thing reply!